Fortra GoAnywhere MFT SFTP Brute Force Vulnerability

Fortra GoAnywhere MFT SFTP Brute Force Vulnerability

The National Vulnerability Database has disclosed CVE-2026-0972, a critical vulnerability in Fortra’s GoAnywhere MFT. This flaw affects SFTP services prior to version 7.10.0, specifically when web users are configured for SSH key-based authentication. The system fails to enforce login attempt limits, creating a significant attack surface.

This lack of rate limiting allows attackers to repeatedly guess SSH keys via brute force. While SSH keys are inherently more secure than passwords, their strength relies on proper implementation and protection. Without login attempt throttling, a sufficiently persistent attacker can eventually compromise accounts, even with strong keys.

The CVSS score of 7.3 (HIGH) underscores the severity, with an attack vector that requires no user interaction and can be executed remotely (AV:N/UI:N). This directly impacts confidentiality, integrity, and availability (C:L/I:L/A:L) as successful brute-forcing grants unauthorized access and potentially allows data manipulation or exfiltration. Defenders must prioritize patching and review their GoAnywhere MFT configurations immediately.

What This Means For You

  • If your organization uses Fortra's GoAnywhere MFT for SFTP, you are exposed. Immediately patch to version 7.10.0 or later. Audit your web user configurations to identify any relying solely on SSH keys without additional multi-factor authentication. Assume any unpatched GoAnywhere MFT instance with SSH key-only access is a ticking time bomb.

Related ATT&CK Techniques

🛡️ Detection Rules

3 rules · 6 SIEM formats

3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.

high T1110.004 Credential Access

Fortra GoAnywhere MFT SFTP Brute Force via SSH Key Guessing - CVE-2026-0972

Sigma YAML — free preview
✓ Sigma · Splunk SPL Sentinel KQL Elastic QRadar AQL Wazuh Export via Bot →

Indicators of Compromise

IDTypeIndicator
CVE-2026-0972 Vulnerability CVE-2026-0972
Source & Attribution
Source PlatformNVD
ChannelNational Vulnerability Database
PublishedApril 21, 2026 at 18:16 UTC

This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.

Believe this infringes your rights? Submit a takedown request.

Related Posts

CVE-2026-40565 — FreeScout is a free self-hosted help desk and shared

CVE-2026-40565 — FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.213, FreeScout's linkify() function in app/Misc/Helper.php converts plain-text URLs in...

vulnerabilityCVEmedium-severitycwe-79
/SCW Vulnerability Desk /MEDIUM /6.1 /⚑ 2 IOCs /⚙ 3 Sigma

BRIDGE:BREAK Flaws Plague Lantronix and Silex Serial-to-IP Converters

Forescout Research Vedere Labs has uncovered 22 critical vulnerabilities, collectively named BRIDGE:BREAK, impacting Lantronix and Silex serial-to-IP converters. These devices, crucial for bridging legacy serial...

threat-intelvulnerabilitydata-breachcloudmicrosoft
/SCW Vulnerability Desk /MEDIUM /⚑ 1 IOC /⚙ 3 Sigma

CVE-2026-1089 — Information Disclosure

CVE-2026-1089 — User‑Controlled HTTP Header in Fortra's GoAnywhere MFT prior to version 7.10.0 allows attackers to trigger a DNS lookup, as well as DNS Rebinding and...

vulnerabilityCVEmedium-severityinformation-disclosurecwe-74
/SCW Vulnerability Desk /MEDIUM /6.5 /⚑ 2 IOCs /⚙ 3 Sigma